Moon of Alabama — Jan 6, 2017
After Hillary Clinton was defeated in the U.S. presidential election the relevant powers launched a campaign to delegitimize the President elect Donald Trump.
The ultimate aim of the cabal is to kick him out of office and have a reliable replacement, like the Vice-President elect Pence, take over. Should that not be possible it is hoped that the delegitimization will make it impossible for Trump to change major policy trajectories especially in foreign policy. A main issue here is the reorientation of the U.S. military complex and its NATO proxies from the war of terror towards a direct confrontation with main powers like Russia and China.
The cabal consists of President Obama, the defeated candidate Hillary Clinton, neoconservatves like the State Department’s cookie dispenser Victoria Nuland, the Republican senators McCain and Lindsay and the military-industrial complex. (One of the few neocons planted near to Trump, former CIA director James Woolsey, threw the towel today and left the Trump transition team.)
A major role in directing the plot has fallen to Obama’s consigliere John Brennan, the current director of the CIA. Another role has been delegated to the various military and NATO think tanks like the Atlantic Council and the British RUSI and reliable proxies within the media.
The current emphasis of the campaign is on the release of emails and papers from the Clinton campaign through Wikileaks. It is alleged that some releases were gained through hacking, planned and executed by the Russian government. Trump had announced that he plans to seek good relations with Russia, the power that the cabal had earlier chosen as the new enemy de jour.
But there is a problem. There is no real evidence that a “hack” ever happened. There is no evidence that Russia is involved. None at all.
Three cases of paper releases have to be differentiated:
- The emails from Clinton’s private basement mail-server were released by the State Department after various FOIA requests.
- Emails from Clinton’s campaign chief John Podesta were released after someone“spear phished” his Gmail password and got access to his mail box. Such spear phishing – sending an email which asks to change one’s password on a faked login page – happens thousands of times each day. Naturally prominent people with publicly widely known addresses are the preferred targets of such stunts. This has nothing to do with real hacking which defeats a system’s defense by manipulating computer code.
- The Democratic National Council was probably hacked. “Probably” because it is still quite possible that a (murdered?) insider leaked the DNC emails and the hacking “evidence” is made up to conceal that. But even that “evidence”, presented by the DNC hired company Crowdstrike, is thin.
Allegedly there were two different hacks into the DNC. One was probably harmless, the second one is said to have gained system-level access. I have found no explanation yet how the hackers of the second attack got their first entry into the DNC system. Was an administrator spear-phished? Crowdstrike’s fluffy account doesn’t say. But it mentions two well known tools the alleged hackers are claimed to have used: “RemCOM, an open-source replacement for PsExec available from GitHub” and “X-Agent malware with capabilities to do remote command execution, file transmission and keylogging”. The X-Agent hacking suite has been known for some time and is used by several actors. It is likely also in use by other non-state and state services. All such hacking tools use freely available infrastructure like TOR or rented networks from cyber-crime wholesalers like the recently exposed Israeli denial-of-service franchiser.